mirror of
https://github.com/containers/podman.git
synced 2025-06-22 18:08:11 +08:00
Don't setup AppArmor provile for privileged pods
This is essentially db218e7162c2 forward-ported to specgen Signed-off-by: Ralf Haferkamp <rhafer@suse.com>
This commit is contained in:
@ -525,8 +525,10 @@ func FillOutSpecGen(s *specgen.SpecGenerator, c *ContainerCLIOpts, args []string
|
|||||||
s.ContainerSecurityConfig.SelinuxOpts = append(s.ContainerSecurityConfig.SelinuxOpts, con[1])
|
s.ContainerSecurityConfig.SelinuxOpts = append(s.ContainerSecurityConfig.SelinuxOpts, con[1])
|
||||||
s.Annotations[define.InspectAnnotationLabel] = strings.Join(s.ContainerSecurityConfig.SelinuxOpts, ",label=")
|
s.Annotations[define.InspectAnnotationLabel] = strings.Join(s.ContainerSecurityConfig.SelinuxOpts, ",label=")
|
||||||
case "apparmor":
|
case "apparmor":
|
||||||
|
if !c.Privileged {
|
||||||
s.ContainerSecurityConfig.ApparmorProfile = con[1]
|
s.ContainerSecurityConfig.ApparmorProfile = con[1]
|
||||||
s.Annotations[define.InspectAnnotationApparmor] = con[1]
|
s.Annotations[define.InspectAnnotationApparmor] = con[1]
|
||||||
|
}
|
||||||
case "seccomp":
|
case "seccomp":
|
||||||
s.SeccompProfilePath = con[1]
|
s.SeccompProfilePath = con[1]
|
||||||
s.Annotations[define.InspectAnnotationSeccomp] = con[1]
|
s.Annotations[define.InspectAnnotationSeccomp] = con[1]
|
||||||
|
Reference in New Issue
Block a user